View/Open - Scholarly Commons Home
View/Open - Scholarly Commons Home
View/Open - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
mobile devices could easily gain access within a “network‟s footprint” if this access in<br />
this network is not secure. One can easily login to this “network footprint” if signals in<br />
that area can be detected. Hackers can be denied gaining access to the network if<br />
suitable security policies and user authentication are in place.<br />
If services offered through mobile devices are difficult to use, this potentially frighten<br />
away possible users. Apparently most people will use the service and system that are<br />
easy to use. This is obvious especially in countries where human capital development is<br />
still a concern.<br />
Standards is also an important area that must be considered as indicated by Goldstuck<br />
(2003). It is crucial to defined clearly any of the guidelines with regards to mobile<br />
devices and applications and also the architecture that will drive the delivery of services.<br />
It can be very difficult for the need to redevelop and can be costly for a replacement if<br />
this issues are not resolve. The standards must be flexible in a way that more than one<br />
manufacture and suppliers are used. These issues must be taken into consideration in<br />
dealing with mobile solution.<br />
The World Wide Worx (2011) conducted a research in 2003 on mobile solutions have<br />
identifies four ways to categorise the applications base on whether to wait or replicated<br />
on the solutions (Goldstuck, 2003). Replicating mobile solution is the first category<br />
only if proven solutions are known to work through examples and pilots. This would<br />
have quick implementation and knowing the cost involve. To demonstrate where values<br />
need to be proven is the second category. Thirdly, mobile solutions that seems to have a<br />
lot of excitements from users or when there is hype about the mobile application,<br />
government and general public are warn not to implement these applications too soon<br />
- 50 -